期刊文献+

一种基于代数签名的远程数据完整性验证方法 被引量:4

AN INTEGRITY VERIFICATION ALGORITHM FOR REMOTE DATA BASED ON ALGEBRAIC SIGNATURE
下载PDF
导出
摘要 云存储服务中,用户将数据存储在不可信的云储存服务器上,用户数据面临安全考验。针对这种情况,为了让用户可以验证存储在云存储服务器上数据的完整性,提出一种基于代数签名的远程数据完整性验证方法。首先运用代数签名的特性,生成轻型的代数标签进行数据验证,同时引入一种新的数据结构(DT)来实现远程数据的动态更新从而降低数据验证的计算和通信开销。最后给出该方法的正确性和安全性分析,以及性能分析。实验结果表明,在大规模数据验证时,该方法与其他方法相比具有更高的验证效率、较小的计算和通信开销。 In cloud storage service, users store their data on the untrusted cloud storage server, users data faces security test. In view of this, in order to allow users to verify the integrity of the data stored in cloud storage server, this paper proposes an algebraic signature-based remote data integrity verification method. The method uses the algebraic signature feature first, generates light algebra labels for data verification. At the same time it introduces a new data structure (DT) to realise dynamic remote data updating so as to reduce the overheads of calculation and communication of data veKfication. Finally, the correctness and safety analysis of the method are given, as well as the performance analysis. Experimental results show that in large-scale data verification, this method has higher efficiency, less computation and communication overhead compared with other method.
出处 《计算机应用与软件》 CSCD 2016年第2期302-306,共5页 Computer Applications and Software
基金 国家自然科学基金青年科学基金项目(51308465) 四川省教育厅项目(08ZC055)
关键词 云存储 代数签名 远程数据验证 动态更新 数据完整性 Cloud storage Algebraic signature Remote data verification Dynamic update Data integrity
  • 相关文献

参考文献15

  • 1陈兰香.一种基于同态Hash的数据持有性证明方法[J].电子与信息学报,2011,33(9):2199-2204. 被引量:30
  • 2Ateniese G, Betas R, Curtmola R, et al. Provable Data Possession at Untrusted Stores[ C]//Proc of the 14' ACM Conference on Computer and Communications Security. New York : ACM ,2007:598 - 609.
  • 3Ateniese G, Pietro R D, Mancini L V, et al. Scalable and Efficient Prov- able Data Possessin [ C ]//Proc of the 4th International Conference on SecUrity and Privacy in Communication Netowrks Istanbul. Turkey: ACM ,2008:1 - 10.
  • 4Erway C, Papamanthou C, Tamassia R, et al. Dynamic Provable Data Possession[ C ]//Prec of the 16th ACM Conferdnceon Computer and- Communications Security. Chicago, Illinois, USA: ACM, 2009:213 - 222.
  • 5Juels A, Burton S, Kaliski J. Proofs of Retrievability for Large Files [ C ]//Proe of the 14th ACM Conference on Computer and Communica- tions Security. Alexandria, Virginia, USA : ACM ,2007 :584 - 597.
  • 6Shacham H, Waters B. Compact Proofs of Retrievability [ C ]//Advanc- esin Cryptology (ASIACRYPT) : Springer Berlin Heidelberg, 2008 : 90 - 107.
  • 7冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 8Zhang Y, Blanton M. Efficient Dynamic Provable Possession of Remote Data via Update Trees[ J]. IACR Cryptology ePrint Arc hive ,2012,28 (3) :291 -291.
  • 9Wang C, Ren K, Lou W, et al. Toward Publicly Auditabte Secure Cloud Data Storage Services[ J]. IEEE Network ,2011,24 : 19 - 24.
  • 10Zhou H,Sheng Z, Nenghai Y. A Privacy Preserving Remote Data Integ-rity Checking Protocol with Data Dynamics and Public Verifiability [J]. IEEE Transactionson Knowledge and Data Engineering,2011,23 (9) :1432 - 1437.

二级参考文献56

  • 1陈兰香,许力.云存储服务中可证明数据持有及恢复技术研究[J].计算机研究与发展,2012,49(S1):19-25. 被引量:28
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1104

同被引文献15

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部